1,387 Topics

Member Avatar for
Member Avatar for InsightsDigital

We all know that Twitter and Facebook allows for some level of privacy in regards to your tweets and updates. Some users just make it very public while others make their updates very private and for the eyes of selected few. Thus, there was a concern that search engines, especially …

0
91
Member Avatar for happygeek

I love Twitter, and post a lot of links to security related stories via my [URL="http://twitter.com/happygeek"]@happygeek[/URL] account. But now I am getting a little worried that I might suffer the same fate as a well known, and highly respected security expert. Mikko Hypponen is a familiar face around the security …

Member Avatar for MktgRob
1
672
Member Avatar for happygeek

Odd isn't it, how Microsoft kicked up a fuss when Google announced the Chrome plugin for Internet Explorer on the grounds that it could make the browser more insecure. Indeed, it went as far as to suggest that it doubled the potential surface area for malware and scripted attacks. Yet, …

Member Avatar for fossrules
1
751
Member Avatar for happygeek

Just when it looked like every avenue to prevent the extradition of self-confessed NASA Hacker Gary McKinnon had been exhausted, especially when just last week a couple of High Court judges denied him leave to appeal his case to the highest court in the UK, it looks like the [URL="http://www.daniweb.com/blogs/entry3877.html"]hacking …

0
486
Member Avatar for nitin_rajurkar

Hi All, I have a typical problem. We have established product developed in ASP. Now I want to add security and access cotrol to upload directory and files. I could not find anything that can help me to write code in ASP. But in ASP.net C# and C++ there is …

Member Avatar for nitin_rajurkar
0
222
Member Avatar for happygeek

The European Commission has called on EU member countries to do more, and do better, in fighting spam and other online privacy threats. In a newly published [URL="http://ec.europa.eu/information_society/policy/ecomm/doc/library/ext_studies/privacy_trust_policies/spam_spyware_legal_study2009final.pdf"]study[/URL], commissioned by the EC, it was revealed that almost all EU countries have at least one spam, spyware or malware reporting site …

Member Avatar for kofi kingston
0
651
Member Avatar for newsguy

Jon Lech Johansen is perhaps best known as DVD Jon, the chap who cracked DVD movie encryption at the tender age of just 15. He may soon have to adopt a new nickname, how about iTunes Jon, as he releases software that takes iTunes out of the iPod music equation. …

Member Avatar for CouchGuy
2
457
Member Avatar for MktgRob

[url]http://mashable.com/2009/10/10/facebook-poke-arrest/[/url] In a society that has become as litigious as ours, this was inevitable. If you read the link above you will find out that a woman has been charged with violating an order of protection for poking someone on Facebook. If found guilty, the woman could get a month …

Member Avatar for MktgRob
0
190
Member Avatar for khess

No, I'm not talking about a Linux vs. Microsoft or Apple vs Microsoft but rather a prediction by UN Telecommunications Agency Chief Hamadoun Toure'. Apparently, the U.S. Homeland Security and other U.S.-based paranoia groups agree since US Secretary for Homeland Security Janet Napolitano said that she received the green light …

2
218
Member Avatar for slfisher

A poll on whether President Barack Obama should be assassinated, which was posted to Facebook on Saturday, has been taken down after an investigation by the Secret Service, according to [URL="http://www.npr.org/templates/story/story.php?storyId=113282766&sc=fb&cc=fp"]NPR.[/URL] The poll consisted of a single question: 'should obama be killed? [sic]' with the choices yes, maybe, if he …

Member Avatar for InsightsDigital
0
131
Member Avatar for newsguy

It seems that Google searches on terms that are related to iPhone SMS information are being used to return results that direct unsuspecting users to rogue AV sites. According to the Websense Security Labs ThreatSeeker Network [URL="http://securitylabs.websense.com/content/blogs.aspx"]blog[/URL] malicious URLs related to Apple iPhone SMS/MMS searches are ranking as high as …

2
201
Member Avatar for funlovingashish

hiiii, i have to build a secure web application using jsp, for which i have to implement SSL. I have generated the certificate using java keytool but as soon as i edit my server.xml file to enable connector port for https (8443) and add the other attributes like keystore,storepass and …

Member Avatar for funlovingashish
0
216
Member Avatar for slfisher

Remember [URL="http://www.daniweb.com/news/story219413.html"]Terry Childs[/URL]? He was the network administrator for the city of San Francisco who -- claiming he was protecting the city government's computer system from incompetent coworkers -- changed the system's passwords and then for more than a week refused to give them to anyone, even after being arrested. …

0
344
Member Avatar for happygeek

One third of businesses totally fail to encrypt their sensitive data transfers. That's the conclusion of a new [URL="http://www.computerlinks.co.uk/products/ipswitch/download_library.cfm"]survey[/URL] into file transfer security which noted the huge disparities in attitudes towards data security in general and data security during transfer. According to the 2009 File Transfer Security Survey undertaken by …

0
334
Member Avatar for happygeek

According to a new report, published today by SANS, the overwhelming majority of all cyber-security risks can be laid at the door of just two areas: unpatched client-side software and vulnerable Internet facing web sites. The report was compiled by Rohit Dhamankar, Mike Dausin, Marc Eisenbarth and James King of …

1
546
Member Avatar for happygeek

Remember Conficker, the virulent worm which caused such havoc at the start of the year? No, well maybe news headlines such as '[URL="http://www.itwire.com/content/view/22716/53/"]Virus sinks Royal Navy fleet comms[/URL]' and '[URL="http://www.daniweb.com/news/story220128.html"]Windows worm infects millions[/URL]' might help jog your memory. Well hold onto your hats people, Conficker is back. And this time …

Member Avatar for happygeek
1
334
Member Avatar for redserpent7

[B][COLOR="Red"]Important:[/COLOR] [COLOR="Green"]Please read the whole question before answering.[/COLOR][/B] I would appreciate it if someone can guide me to the new MS APIs necessary for modifying/controlling the Windows 7 Action Center. What I need to do is integrate the Backup notification messages in my application which is a backup application in …

0
144
Member Avatar for aimlessWonderer

It's long, but trying to give as much informtion as possible at one time. Having an issue with random individuals trying to access an intranet site with a security certificate. Most users are able to simply select their Smartcard/CAC certificate, enter the pin number and then are granted access to …

0
119
Member Avatar for happygeek

It's good news for those in the security business, according to Gartner at least. It is predicting that security software and services spending will outpace other IT spending areas in 2010. The Gartner [URL="http://www.gartner.com/DisplayDocument?ref=g_search&id=1141513&subref=simplesearch"]report[/URL] suggests that security software budgets will grow by approximately 4% in 2010, while security services budgets …

0
639
Member Avatar for newsguy

Symantec has detected a new Trojan which targets Skype users in order to monitor and record conversations made using the Internet telephony service. Apparently the source code for this particular Trojan, called Pesky Spy, is already being touted around the usual places where the bad guys can pick up such …

1
239
Member Avatar for slfisher

If you've used Facebook for more than, oh, five minutes, you've seen a Facebook quiz. "What Greek dance are you?" "Which NFL coach are you?" "Which Diplomacy country should you play?" and so on. (I forget every quiz I see, and I'm up to more than 250 by now.) But …

0
441
Member Avatar for slfisher

What, you hadn't heard? "A Senate bill would offer President Obama emergency control of the Internet and may give him a "kill switch" to shut down online traffic by seizing private networks -- a move cybersecurity experts worry will choke off industry and civil liberties," [URL="http://www.foxnews.com/politics/2009/08/28/senate-president-emergency-control-internet/"]FOX News[/URL] said breathlessly. (Nice …

Member Avatar for Garland
0
2K
Member Avatar for happygeek

It's always fun to stand and watch as two big names slug it out, and they don't come much bigger than Microsoft. Sophos, it has to be said, is no small fry either when it comes to the world of IT Security. So when a Sophos [URL="http://www.sophos.com/blogs/gc/g/2009/07/17/guest-blog-xp-mode-demonstrating-security-microsofts-priority/"]blog posting[/URL] from it's …

Member Avatar for happygeek
0
563
Member Avatar for happygeek

As someone who works within the IT Security space, I have to say that rogueware (also known as [URL="http://www.itwire.com/content/view/20938/53/"]scareware[/URL]) is starting to seriously hack me off. Not that I have ever been conned into purchasing it, I hasten to add, but rather because so many others have and so many …

0
315
Member Avatar for slfisher

Want to do a public records search on email messages from your state legislator? Chances are, you won't be able to, even with the recent move toward [URL="http://www.daniweb.com/blogs/entry4592.html"]transparency in government[/URL]. Even states that do have an email retention policy in state government -- and many of them don't -- often …

0
145
Member Avatar for GuyClapperton

One last quick entry before the weekend starts (and before the month ends) - I saw a story on [URL="http://twitter.com"]Twitter[/URL] today in which some hackers claimed they'd found a flaw in the iPhone that would allow a malicious person to take control of every one of those phones in rthe …

0
66
Member Avatar for happygeek

Gary McKinnon is either a UFO-obsessed nerd who happens to suffer from a form of autism, or a fugitive from justice who was responsible for the biggest military hack of all time. The description varies depending upon whether you are a balanced individual with no axe to grind or the …

Member Avatar for Dread Cthulhu
0
445
Member Avatar for GuyClapperton

There has been a lot of comment in the past on Gary McKinnon and his hacking into US military computers. Readers might understand that some of the comment in the UK has been about how he should have been tried over here, there's no need to extradite him and if …

Member Avatar for GuyClapperton
0
218
Member Avatar for happygeek

There are two things you can be sure of about the annual Las Vegas Black Hat security conference: nobody will use the free wifi as they are all too [URL="http://www.itwire.com/content/view/19935/53/"]worried about being hacked[/URL], and someone will demonstrate an exploit that will scare the living bejesus out of you. The latter …

1
478
Member Avatar for slfisher

How transparent is too transparent? In an attempt to make it easier for ordinary people to see what their governments are spending their money on, more entities -- from city to federal -- are putting this information online, noting that it's a public record. But some government workers are uncomfortable …

0
120

The End.